Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
58 views
43 pages
Network Security 4th Unit
Notes
Uploaded by
Kaviya S
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save Network Security 4th unit For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
58 views
43 pages
Network Security 4th Unit
Notes
Uploaded by
Kaviya S
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save Network Security 4th unit For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 43
Search
Fullscreen
embedded Systems and lor ao Oe (iesener | HTTP Cent 1. Client server “Theprinciple behind the client-server conference separations of concems forexample client should not be concemed with he storage of data whichis theireoncem of the serve. Similarly the server should not be concemed about the user interface whichisa concemofike client. Separationallows client and servertobe independently deployed and updated 2. Stateless Each request from client to server must contain all the information necessary 0 understand the request, and cannot take advantage ofany stored context on the serve. 3.Cache-able ‘Cache constraint requires that the data within the response to arequest be or explicitly labeledascatchable or non-catchable. Then aclientcache to reuse that response data for ater, equivalent requests. Comple attractions and improve efliciency and scalability, ° ‘communication and open Platforms Io ts 4 ayered system " gtem constraint come off constants, constrains the beavor of component hh component cannot see beyond the immediate lay ith ih they ae Example client cannot tell wheter itisconnected directly totheend serene “ rer fpaninterediary long the way system scalability can beimprovedallowingintermetars tead of tender server. Uniform interface constraints requites that the method of communeation between cljntand server must be uniform, Resourees are identified in the reqpestand separate ¢ representation of the resource that are returned to the cliext. When climber foldsa representation of your resource ithas all the infonnation required to updanece the resource, demand e can provide executable code script for clieats to execcne is tr. ‘This is an optional constraint. REST Client = UPDATE or DELETE) GSON or XML) Response (JSON or XML) Request (GET, PUT, UPDATE or DELETE) with payload (ISON or XML) Response (JSON or XML) Figure 4.6: Request-Response model used by RESTembedded Systems and or Figure 4.5 shows the communication between i REST NS codel used by RE i ws the interactions in the request-response 0° Figure 4.6 shows the interactions in the rea! cre al Web APL8S3 ete Uy ese URLIs usi ‘Chup//example.com/api/tasks/) The elient send requen hese UI using HTT protocol (c.g GET,PUT ,POST or | DELETE). ARESTfal web: sevee CaN SUPPOTT Various Internet media types (JSON). 4.1.2.2 WebSocket-based communi WebSocket APIs allow bi-directional, and servers. WebSocket APIs follow the exclusive Figure 4.7. Unlike request-response API a require new connection to be set up foreach message 10 be sent. WebSocke begins with connection setup request send by the client tothe server The terpretsitasan upgrade request. the server setup 46 li collection of resources which are represented bY cation API duplex communication tion model show between pair communis I duplex commu and do nat requestis sent over http and the s support protocol response to the webs the client and the server can send data or messages to each other in full duplex mods, ead for conn WebSocket API reduce network traffic and jon records to each message, Web Socket Protocol Client Server Request to setup WebSocket Connection Response accepting the request Data fede Data frame Data frame Data frame Connection close request } Closing Connection ire 4.7: Exclusive pair model used by WebScoket APIs verte network. These protocols define the data exchange fomnatsand data encoding e gain0 ; fs for devices and routing of packets from source to destination. Other functionof the seh poe include sequence control flow control and transmissions of Lost packet. ‘pplication Layer =] nip CoaP Websockets marr xuer ons © aMap Transportlayer 802.3 - Ethernet, 802.16-WiNtox 502.15.4- LRAVPANEmbedded Systems and Ioy ag ‘LAN) technology based on the leg (APS) have a lors, The Wi-Fi data rate is based gq, Mbps, IEEE 802.116 cay isa Wireless Local Arca Network (W1 achieve up to 866.7 M ve up to 150 Mbps, IEEE 802.1 ac can IEEE 802.1 1ad can achieve up to 7 Gbps. 3. 802.16 - WiMax Iisa collection of wireless broadband standard forthe link layer. WiMax standard provides data rates fron to 1 GB per second. The recent update provide data rate of hundred MB per second for mobile stations and 1 GB per second for fixed stations, MB per secon 4. 802.,15.4—-LR-WPAN al arca networks nut Itisa collection of standards for low rate wireless pers These standards form the bass of spec protocols such as Zighee, LR-WPAN standards provide data rates from 49 Kbis to 250 Kb 5. 2G/3GMG-Mobile communication tandards including (UMTS and CDMA 2000) IoT devices based on these star ‘There are different generations of mobile commui 2nd generation (GSM,CDMA), 3rd Gener: Gen and lards can from 9.6 KBPS for 2G 100 MB per second for the 4G. Network/Internet Layer ‘The network layers are responsible for sending P datagrams from the source network munication and open Platforms 4, IPvd lemet protocol version 4s the most deployed internet protocol to{dentify the devices onanetwork using ahierarchical addressing scheme IPvg uses a 32- itaddress space which provides 4,294,967,296 (2) unique adresses 1Pv6 1P¥6 (Internet Protocol version 6) isthe sixth revision tothe Inemet Protocol ly (o IPv4 in thatit provides the unique IP addresses necessary for Internet-enabled devices to communicate. IPv6 uses 128-bit (28) addresses, allowing 3.4 x 1038 ‘unique IP addresses, 3. GLOWPAN IPV6 over Low Power Wireless Personal Arca Network brings IP protocol to low power devices which have 2.4GHz frequency range and provides data transfer rate of 250 KB per second, ‘Transport Layer ansport layer protocols provide in message transfer eapa ransfer capability can beset up on connect indshakes/acknowledgments low control and conge 1 control protocol is the most protocols.that is used by web browsers, email and jented and stateful protocol. Whil nsport layer nsfer. TCP is a deals with sending isa connectionless protocol. UDI guaranteed delivery, reliable delivery.mes embedded Systems and Io jon Layer Application layer protocols define how the appl layer protocols to send the data over the network. API ions in the face With the lowe, layer protocols enabje process to process connections using ports. 1. HTTP Hypertext Transfer Protocol jon layer protocols tha forms the foundation ofthe World Wide Web. The primary or a common HTTP commands are POST, GET, PUT, PATCH, and DELETE. The protoco, follows a request-response model where a client sends request {0 a server using the HTTP commands. the ap 2. CoAP Constraint Application Protocol (CoAP) is an application layer protocol for Machine to Machine (M2M) applications meant constrained environments ined devices and constrained networks. CoAP is a web transfer er it runs on top of UDP with const protocol and it uses a request response mode! howe’ instead of TCP. CoA Pusersaclient server architecture and client communica, with servers using connectionless diagram, 3. WebSocket ‘WebSocket protocol allows full duplex communication over a single socket ‘connection for sending messages between client and server. WebSocket is based on TCP and allows streams of messages to be sent back and forth between the ile keeping the TCP connection open. ‘on the servet ‘The broker forwards the messages to the client subscribed to topic. MQTTis ‘well-suited for constrained environment. 40 » jor Communication and open Platforms 5, XMPP tensible Messaging and Presence Protocol isa protoce fr real time communication and streaming XML data between network powers wide range of ap, ns including messaging ing, presence, data mn, gaming, multiparty chart and voice/video calls, syndi 6. DDS Data Distribution Services a data centric middleware standard for device to device or machin? to machine communication, DDS uses.a publish-subseribe model where publishers create top provides quality of service controland configurable rel 7. AMQP ‘Advanced Message Queuing Protocol isan open application layer protocol for business messaging, AMQP supports both point to point and publ dels, routing and queuing . AMQP brokers receive messages from publishers and route them over connections to consumers. Publishers publish the messages to exchanges which then distribute message copies to queues. Messages on either delivered by the broker to the consumer's which have subscribed to the queues or the consumers can pull the messages from the queues. 43 BLUETOOTH Bluetooth protocol isa wireless technology standard for exchanging data over short short-wavelength UHF radio waves in the ids, ftom 2.400 t0 2.485 GHz. Bluetooth network ielessly over a short-range ts form a personal \s developed to support simple wireless communications between telephones, other devices, and has evolved to support a wide range of devices and Use eas, suchasa ,dded Systems and wo Oe Characteristics of Bluetooth Protocols : 15. epi Bluetooth isa wireless technology standard IEEE 802 This eal ‘piconets. Here master of one piconet can be a slave in F on le car exchangedata overashort range Withoy | another Pic in Feccive a message from a master in one piconet and con the other pi is ore than 100 mers) COMUNcaigg o piconet. Therefore, this type of node is spfered 1038. bridge node. Above lla station cannot be master in two piconets. + Bluetooth was developed asa wayto the need for wires and for short-range (NO ina star configuration, witha single primary device thet controls sever secondary devi S. + Bluetooth operates across both layers 1 PHY) and? (MAC) of the OSI mode, 4.3.4 Bluetooth Architecture Architecture of Bluetooth has two network types = 1. Piconet : Seaternet Figure 4.10: Scatternet 4.3.2 Bluotooth Protocol luctooth standard can be loosely grouped physical ‘Single piconet Multiple piconet ayer, middleware layer, and application layer as shown in the following. Figure 4.9: Piconet Physical Layer This includes Bluetooth radio and Baseband (also in the dat led apiconet. It contains one mas contains one master and mul layer), es the communication yer devices andit structure and spec : ect Slave to Slave communication ist frequency bands, fequency hopping speviticat in other words jaseband : This protocol takes the services of radio protoc: eine addressing scheme, packet frame fo in piconet and power e Logical Link Control and AdaptatEmbedded Systems and joy 5. The message eneryptigg Prysicl Layer sluctooth protocol architecture ‘ludes Radio Frequency Communications (RFComi) Is, SDP, and AT commands. + RFComm: It is short for Radio Frontend Component. It provides a seta! interface with WAP, protocol, adopted prot jotcomm Adopted P' Protocol (PPP), unication and open Pla ms 415 rotocols : These are th * Protocols that are adopted from standar fi cd els. The commonly adopted protocols used in Bluetooth are Point-to-Point temet Protocol | User Datagram Protocol (UDP) ‘Transmission Control Protocol (TCP), and ' ‘Wireless Application Protocol (WAP). + Service Discovery Protocol (SDP): SDP takes care of service-related queri ike device information so as to establish a connection between contending Bluetooth devices, + AT Commands: ATter mn command set ayers of Architecture of Bluetooth Host Controller Interface A command interface for the controller and for the link ‘manager, which allows access to the hardware status and Togical Link Control and Adaptation Protocol stack. and lower layers of the Bluetooth protocol stack. Radio (RF) layer Itperforms modi mnof the data into RF signals. Baseband Link layer Ta shor it performs the connection establishment within apiconet. SDP layer ‘hort for Service Discovery Protocol. It allows for discovering the services available on another Bluetooth enabled device. WAP, js short for Wireless Access Protocol. It is used for termet access. TCs is short for Telephony Control Protocol. It provides a Jephony service. Tnshort, itenables the user to interact with the applicationAdvantages of Blueto + Bluetooth offers economie wireless solution (both data & voice) but, for shor distances + Onthe other hand, Mobite and stationary environment use Bluetooth protoca), + There is no setup fi device. + They are up-gradable. ns of Bluetooth Wireless control and communication between a mobile phone and a handsfree headset, + Wireless communication between a smartphone anda smart lock for unlocking doors. + Forlow bandwidth applications where higher USB bandwidth is not required and cable-free connection desired, Smartwatches, Smart 4.4 WIFI I form) Wireless Fidelity/ frequencies which enable the ty of many computers hence a way to connect internet from the access 1 family of standards and ied to provide in-building ly a local area networking (LAN) technology broadband coverage. 10 417 provides Internet access o devices that are within the range of about 20-40 ors the souree, It has a data rate upto 600 Mops maximum, depending on Ghannel frequency used and the numberof antennas. In embedded systems, ESP series controler from Espressi are popular for building oT based app 4 P8266 are the most commonly use wifi modules forembedded ap eee The Wi ‘The first 802.11 standard to gain broad industry acceptance was & though 02.11b products are all based on the same standard, there is always a concern whether oducts from different vendors wil successfully interoperate. Tome! this concen, the Wireless teroperability for 802.11b products. The term used for certified 802.11b products i-Fi certification has been extended to 802.11g products. nce has also developed a certification process for 802.11 products, -Fi Alliance is concerned with a range of market areas for WLANS, cettification procedures for IEEE 802.11 security standards, referred toas Wi-Fi Protected ‘Access (WPA). The most recent version of WPA, known as WPA2, incorporates all of the features of the IEEE 802.111 WLAN security specific Features + Network Type—LAN(Local Arca Net + Technology Traditional Radio Transmission. + Standards ~ IBEE 802.11. ~~ + Communication Dis + Frequency ~2.4 GHz Or SGI + Power Usage—Medium.~ + Range—Up To50M~~ VY + Data Rate ~ 0-1 To 54 Mbps. Topology Star, Tree, P2P. 7 ' Connecting Devices ~4 To 8 Devicesata time. a EEEEmbedded Systems and Ioy 2 eee 4.4.1 IEEE 802.11 Architecture Distribution System is send out from the local station to the APand then relayed by the AP ion. The DS can be a switch, a wire network over or a wil _BSS(IBSS). AN IBSS is typically an ad hoc network. Ten inshishesch saionbelogstoasnge nee Tange only of other stations within the same BSS. © overlap geographically, so that a single station could erste inmore than one BSS, Furhemare the asoctonbetwesn ata fabs amie Stationsmay tum of, come witinrangandgooutofange md An Extended Service Set (ESS) consists of two or more basic service sets 44.2 Frame Format of IEEE 802.11 The main fields ofa frame of wireless LANsas laid down by IEEE 802.11 are itsacknowledgment occupy the channel. ¥ Address fields : There are three 6-byte address fields cont ion, and final endpoint respectively. ¥ Sequence : It a2 bytes field that stores the framenumbers. Data: Thisisa varable-sizd fed that carriss the data from the upper layers. The maximum size of the data field is 2312 bytes. Y Check Sequence : It isa 4-byte field containing error detection information, —____ a abner Genes 4.13; Frame format of IEEE 802.11 Figure4.4.3 IEEE 802 Protocol Architecture IEEE 802.11 standards are defined within the structure ofa layered set of protocols, “The structure, used forall IEEE 802 standards isillutated in Figure 4.14 Physical Layer “The lowest layer ofthe IEEE 802 reference model is the physical layer, which includes jon/reception. In addition, ‘Media Access Control AILLANs consist of col ‘Some means of controlling act provide an orderly and effi that capacity. Thi ‘Access Control (MAC) layer. The MAC layer receives data from a higher layer protocol, the Logical Link Control (LLC) layer, in the form ofa block of data known as the MAC Service Data Unit (MSDU). In general, the MAC layer performs the following functions: wns of devices that share the networks transmission cess to the transmission medium is needed to the function of a Media compacts sateen po moos Logical Link | jae amt Control Error control Cees eee, Control feng Wins eee pra Paco g, Siimmatccrengee” yoy saa een Physical Winellie Figure 4.14: IEEE 802.11 Protocol stack | jprcommunication and open Platforms ] Ontransmission, assemble data ntoa fame, kownasa MAC Protocol ° 'rotocol Data Unit (MPDU) with address and error detection fields.» « Onreception, disassemble frame, and pean perform address recognition and error Govern access to the LAN transmission medium, Sine] Datinaton | Seare—7 control | MAC Address | MACAddras | ACS rie Date Uni aise | CRE a FS Figure 4.15: General IEEE MPDU format ‘The exact format of the MPDU differs somewhat for the various MAC protocols in of the MPDUs havea forma use, In gener ofthis frame are as follows: MAC Control: This field containsany protocol control informati ing of the MAC protocol. For example, priority level could be indicated here. Destination MAC Address: The destination physical address on the LAN for this MPDU. ‘Souree MAC Address: The source physical address on the LAN for this MPDU. : The data from the next higher layer. MAC Service Data Ui Redundancy Check field; also known as the Frame Check fe suchas that used in other in the entire MPDU. yer performs the same Sequence (FCS) field. Thisis an error-detecting cod datalink control protocols. The CRC is calculated based onthe ‘e CRC and adds it tothe frame. The re compares that calculation to the CRC fieldin then one or more bits have bern ‘The sender calculates th calculation on the incoming MPDU ané that incoming MPDU. Ifthe two values don’t match, .dtoas the MAC header, and the field t fi fore “The fields preceding the MSDU field are re ng the wsbU eldisrefered oasthe MAC trailer. The header and tile contain, i jeld and that are used by the MAC protocol. information that accompany the data fi4 Bg es 5 3 Bat -= = ; 4.22 Logical Link Control detec MAC and LLC byers. The MAC layers respor inervors. The LLC layer opti jvedand retransmitted unsuccessful frames. Sixof the services are used to sup; ‘Six ofthe services are used to sup; largeto be transmitted ina sing ina series of MPDUs. “damage! fumes Inthe LAN protocol architecture, these two functions ares s 3 detectingewors and discartng ay eps rackof which frameshave ee ‘Table 42: IEEE 802.11 Si {PDU, 4 Embedded Systems and igy + communication and open Platforms 10) . ‘association: Establishes an i port delivery of MSDUs between stations. Ifthe y be fragmented and tnown. For this Purpose, station must 258 te eular BSS. The AP can then commune this informat i routing and delivery of addressed frames, tomove from one BSS to another. A notification from either a station or an AP that an existing ated. A station should give this notifi ion before leaving an ESS or intages Cost-Effective a Convenient Expandabilty Easy To Use And Hassle-Free Service Provider Used to Support Disadvantages ‘Assoctzion Disribuiongsen | MSDU delivery~ ‘More Power Consumption Acheson Sazioa LAN access and security Inconsistent And Instable Destecticsion Setion TAN access and security Dissccsion | DisnhSoaguen MSDU Distbxioa | Dissitufon gam MSDU; ixegration Disvibaioagsam MSDU wireless protocols has features si MSDU delivery Staion MSDU delivery tanta [ Privacy ‘Siztion LAN access and security 7 [- Ressecision | Distinsion yen MSDU delivery 7Embedded Systems ang Tr arange of gramaximum and data rate to tran, ghee offer Tighee re 250 Kbps. Ithas a large number « i boards to make simple projects or application prototypes. 4.5.1 Typos of ZigBee Devices O Zigbee coordinator (FFD) —7 © Zigbee Router (FFD) 7 Zigbee end dev nodes and, unlike router devices, cannot relay messages intended for otber nodes. Zigloce Trust Center (2TC): The Zighee trust center is a device that provides ‘security key distribution, and device authentication. bee gateway is used to connect the Zighee network to another network, suchasa LAN, by performing protocol conversion. eeembedded Systems ang ee of Zigbee Standard 4.5.2 General Charact Low Power Consumption Low Data Rate (20- 250 kbps) Short Range (75-100 meters) Network Join Time (~ 30 msec) Support Small nd Large Networks (upto 65000 devices (Theory); 240 dig, Low Cost of Products and Cheap Implementation (Open Source Protocoly Extremely low-duty cyele, 3 frequency bands with 27 channels. 4.5.3 Operating Frequency Bands Only one channel will be selected for use in a network among the available 27 channels. une 410 | fH tn | o mene 2 20 80 sea81s oy $215 carreto 1. Channel 0: 868) 2. Channel 1-10:915 (the US and Australia) 3. Channel 11.26: 2.4 GHiz (Across the World) jar communication and open Platforms {od Zigboo Topologies ghee uses the IEEE 802.15.4 2003 specification forts phys pes 15ers. es serine align AC “ les; however, Zigboe supports sar, ee, and mesh topologies. uses an association hierarchy; ad ied can either bearer oranend device androterscanaceonmee ae wnt . accept more devices. Cluster Tree © Zigtee Coordinatorembedded Systems and Ioy 428. routers, and en to extend the network coverage: nator or the routers are called children. Only ro Iron, Fach end device is only able to commu inator and routers can coordinator ean have chi parent (router or coordinator). The coordi therefore, are the only devices that ean be paren iron and, therefore, may not be a parent. A spe cluster tree topo “The disadvantages of tree topology are fone of the parents becomes disabled, the children ofthe dis other devices inthe network. isable parent cannot ‘communicate b. Bven if two nodes are geographically close to cach other, they cannot but IEEE 602. 15.4 does supportit. also referred to asa peer-to-peer network, consiss ;,and end devices, as shown gare the characteristics ofa mesh topology: + Amesh topolog: reach their destination. + ‘The range of a nctwork can be increased by adding more devices + Itcaneliminate dead zones. + Amesh topology is self-healing, meaning during transmission, ifa path fails, he node will find an alternate path to the destination, + Devices can be elose to each other so that they use less power. layer. Application Framework | 8 fee | | aoe App |}2 3) ob Object | | Object Object |] A=} (220) 7 “Application Suppor Sublayer (APS) E 3 ge a [Network Layer “a Media Access Control (MAC) Physical Layer Figure 4.20: Zighee protocol Architectureing signals and demodulation gy wes information from a sou, data rate, and channel numbers, fable 4.3 shows the layer frequency band, “Table 4.3: Physical Layer Frequency Band Frequency Band Country Data Rate [Channel Numbers B68.3MH2 | Buropeancountries | _20Kbps 0 902-928 40Kbps re 2.405GHz, Worldwide 250Kbps, 11226, Media Access Control (MAC) Layer TThe functions of the MAC layer are to access the network by using Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA), to transmit beacon frames for synchronization, and to provide reliable transmission. Network Layer ‘The network layer is located between the MAC layer and application suppor sublayer.Itprovides the following functions: ting a network + Managing end devices joining or leaving a network + Routediscovery + Neighbordiscovery Application Support Sublayer (APS) The Application Support sublayer (APS) provides the services necessary for application objects (endpoints) and the ZigBee Device Object (ZDO) to interface wit the network layer for data and management services. Some of the services provided by he APS to the application objects for data transfer are request, confirm, and respons Furthermore, the APS provides commu: ions by defining a unified communication structure (for example, a profile, cluster, orendpoi on for app in embedded Systems and w | or communication and open Platforms jon object (endpoint) n object defines input and outputto the APS. For example, a switch the input from the app 1, Each node can have 240 separate ap so be referred to as an End Point (EP), may al zighee device object (ZDO) Zighee device object performs control and management of app ‘100 performs the overall device management tasks: + Determines the type of device in anetwork (for example, end device, router, or nator) izes the APS, network layer, and security service provider + Binding management End node Each end node orend device can have multiple EPs. Each EP contains an apy addressing requires that the appl A packet is then transmitted to the group address in which the destination device lies. ‘The broadcast address is used to send a packet to all devices in the network, Advantages of Zigbee 1. Designed for low power consumption. 2. Provides network security and application support services operating on the top of IEEE.embedded Systems and ioy | a2 eae te) aa — igbee makes possible completely networks homes where all devices area, tocommunicate and be bee usesa mesh network topology, which allows for cach other without the need for a central hub or router. This makes it ideal for use in smart home applica need to communicate with each other and with a central control hub, 9. Reliability: Zighee protocolis designed to be highly reliable, with robust mechanisms inplace to ensure that data is delivered reliably even in adverse conditions, devices to commut ns where devices Disadvantages of Zigbee short range compared to other wireless itless suitable for certain types of igbee is not as widely adopted as other IoT protocols, ficult to find devices that are compatible with each other. igbee's security features are notas robust as other [oT protocols, threats 1. Smart Energy: Electrical, Gas, Water Meter reading 2. Commercial a # communication and open Platforms ron cons a 2
208 Gain Following table 4.7 mentions features of EC-GSM loT technology. ‘Table 4.7: EC-GSM-IOT Specifications Features Description _| Frequency Same as GSM network, 850 to 900 MHz, 1800 to 1900 MHz Deployment In Band GSM Access Type TDMAFDMA Modu GMSK. 8PSK _[ 200 KHzperchannel : Peak Data Rate | 70 Kbps for GMSK, 240 Kbps for SPSK ownlink/Uplink) Coverage 164 dB with 33 dBm Power Class, 154 4B with 23 dBm power class Duplexing HD, FDD, Power saving mode DRXwing are the benefits or objestives of EC-GSM IoT techno jernet of Things 1 methods for tracking and distributing digital data spatial coordinates. ‘on, we could only know information about which base arrived, ow, but now that we can manage the specifiecurent locaton, transport ‘are improved. orm transportation 4, Differentiate transportation management using loT-GPS ‘the base by RFID et., pick up of passing points on slips, etc.) can be provided, ion from other companies and end users to make apropos t0 4, Reduce employee management costs By having each employee carry a GPS transmitter, itis possible to know “what?, wwho?, where?” and now based on the location information, and produce employee attendance management and safety management. Can reduce the management cost Iof Devices using GPS 1. G62 LORAWAN intemal antennas and backup battery, providing the ability to track any service usi public or private LoRaWAN (Long Range Wide Area Network) networks under the ‘most challenging condition.Agaichcaat i) embeciier Systems andign Features. + 1P67 Rated Rugged + Internal backup battery 2, SENSOR DATALORAWAN terfaces and uploads data through a LoRaWAN network to a range of sensors, GPS, inputs and outputs. Good for applications in agriculture and remote control sensors. Features moisture probes, temperature, EC and others 12 interface fora wide range of sensors including temperature, many others humidity and + GPS for location updates + 1x Analog Input wi auto range TOT ‘The Oyster is a powerful, waterproof, GPS tracking system designed to track unpowered, exposed assets where super-long battery life on LoRaWAN networks is important Features + Upto'S years once the daily location, + Upto2 years of detai tracking, + 1P67 water and dust proof. + Rugged, robust and low profil + No install required ck” over-the-air. + Switch from “locate” to + Integrated accelerometer.7 COMPLETE DESIGN OF EMBEDDED SYSTEMS In This Chapter 5 1 Defining embedded system Y Introducing the design process ¥ Defining an embedded systems architecture 5.1.4 What Is an Embedded System? + Anembedded system is an 3 lied computer system, as distinguished from other types of computer systems such as personal computers (PCs) or scaled-down appli level code. jue today as boards and software resent have been repackaged into moreEmbedded Systems and oy | is designed to perform a dedicated function, ¥ An embedded 5° Most embedded deviees are Pr ve now see devices sucl mnbeded systems designed to beable todoa vagy designed for one specific f phone hybrids, which are et ‘of primary functions. + Also, the atest ety of general funtions un V Anembedded system is a computer system with higher quality other types of computer systen are not really embedded sy her or not computer systems that meet There is some discussion as to tional embedded system definitions are actually are not embedded systems, even though currently these systems are 0 discussed as such among these same designers, Whether or no embedded de systems be designated be determined by oth ations Development popli 53 Fornow, since there ino new industry . ‘ 1pported field of computer: designated for designs that f of computer systems the general-purpose PC systems, between th traditional embedded system and ‘book supports the evolutionary view of embedded systems that encompasses these types of computer system designs, -1 Examples of embedded systems and their markets Embedded Device Engine control Consumer electronics} ‘Telephones/cell phones/pagers Cameras tioning Systems (GPS) Industrial control Roboties and control systems (manufacturing) Tafusion pumps Dialysis machines ‘Networking Gateways Fax machines Office automation Photocopiers Printersphen Embedded Systems a ‘ nd li 5s ao ey | ee 5.4.2 An Introduction to Embedded Systems Architecture 1e 5.2 paloma ‘ctural structures nbded system isan abstraction of the embed Structure Types jonofthesyster that ypically doggy, formation suchas software source code Defi Elements (referred to as modules) are defined as the different functional ‘compon hardware and/ or software that the system needs 10 device, meaning that show detailed implement ardware and sofiware components in ay presented as some composition of interacting . hard on diagrams are typically represented as nts. Elements are representations of hardware and/or software whose modular structures, since Software or shave been abstracted out, leaving only behavioral ang the embedded device eral elements, ‘+ Inshort,an embedded architecture includes elements of the embedded system, clements interacting with an embedded system, the properties of cach of the , and the interactive relationships between the elements Layers ; 5 ‘which modules in higher layers use + Architecture-level information is physically represented in the form of structures. aa rodules of lower layers. A structure is one po: n of the architecture, containing its eagle aiaes ‘own set of represented elements, properties, and inter-relationship information. Kernel + Astructure is therefore a “snapshot” ofthe system’s hardware and software at design time and/or at runtime, given a particular environment and agivensetof Gane icultfor one “snapshot” to capture all the complexities architecture their usages. made up of more than one structure. re presents modules that use Virtual machine gules ofa virtual machine, ———F a ype of modular structure in which some Decomposion Jer gutes are actually subunite (decomposed units) of other Modules and indicated as such. 'cctures, and shows generally what the elements of a particular structure represent and how these elemen Typically used allocation, project management (plan56 Embedded Systems and oy Structure Types! bi Class (also referred orane toasgencralization) elo Tomponeny and connector Client/server (also referred to as distribution) toascommunicating process [Concurrency] and resource| OS and ‘components are connected via threads running inparallel (see Chapter 9 on Oss). Essentially, this structure is used for resource management ‘and to determine if there are any problems with sofiware can be executed in parallel > ‘3 [+ Development ications APP Structure Types" Definition Interrupt Structure represents the I i : Interrupt handli ‘echanismsin system, "4 Priority, round robin) .} mechanism of threads demonstrating the Structure resents the task scheduling| faimess ofthe OS scheduler. femory| This runtime representations ofmemonyand dai ‘Components with the memory allocation and deal location (connector) schemes— essentially the ‘memory management scheme of the sy Garbage collection This structure represents the garbage allocation scheme (more in Chapter 2). “Allocation This structure represents the memory allocation] scheme ofthe system stati or dynamic sae) ‘This structures of tie system atruntimein which] redundant components (hardware and software elements) and their inter communication] i and safety Workassignment iy used in project management. i a software sructure indicating where the| _ located on the development] stem. the stem atrantime whe=| baie this structure are hardware andl el "ate lationshipbetweenelements por ‘in the hardware| Allo atowe Development 58 Embedded Systems and ior SS so lev can be used toresolve these type, : St IS Pity aches ol weds inodae th mn n an embedded or knowing any ofthe inter system design is what it Enmbosed ystems Model sinter en ry ign is what refer to as the + Inahort.an embedded system’ used as a high-level Blueprint defining the infrastructure ts. an architecturecan | of a device and ity ced in implementing the on ofthese risks. Hardware Layer (Required) then be leveraged for Figure 5.1 Embedded Systems Model. Anowledge to be reuse . s odel impliesis that all embedded systems share de meosts. Defining and understanding the architecture of an embedded system is an essential component of good system design. nto the benefits listed above: This igbecause. i Every embedded system has an architecture, whethe ieracting elements (whether isa set of representations of ; because every embedded syster hardware or software). An. This r ‘embedded systems architecture from which a modular architectural structure i j i 2 i z i 5 a : xgardless of the differences between the architecture of a jn these devices as layers. possible to understan\ \d grouping the component imbedded systems architecture asthe primary structure for wo component is there, and why the elements behave the way they do. 5.1.3 The Embedded Systems Modo! + A variety of architectural structures are used to introduce technical concepts and fundamentals ofan embedded system.Embedded Systems and io their associatey us Components elements rhe visual representation of the mal The viel Cet of 8 Mesto visualize eV sre ally the structures leveragey stypeofsictre Isohave a higher degree of interaction, thus separating these proves thestructural organization of the system ions or overlooking required {important for embedded designers to understand as the non-technical aspects of the project, be they factor tse, for example: + The process of defining and capturing the design ofa system. + Working wit power, memory, battery life, ete.) + Marketability and scalat + Deterministicrequirements. | 2 Choose the ions Development ications * a Sat cle iminary Analysi ck [ frevew ana onac, | Feedback Trcorport| Feedback t Review and Test the ee [Deliverand Mt the System Figure 5.2 Embedded Systems Design and Development Lifecycle Model ee eee 5.2 DEVELOPMENT OF IOT APPLICATIONS problem you want to solve or the opportuni ‘and constraints 1, Define the use case: Identify t 10 explore using IoT, Determine the goals, requirements, mn. This step helps you define the scope and purpose of your ‘ToT project. hardware: Select the appropriate [oT hardware devices that lect, transmit, and receive data, Consider factors such as Fi, Bluetooth, cellular), power requirements, sensor swith your chosen software platform. will be used to colEmbedded Systems and lor 2a EE ee eeeETEe—EOee OT 10. software platform: Choose an loT software platform that suits you, form should provide features such as data managemeng, device management, security, analytics, and integration capabilities. Popular lop platforms include AWS IoT, Azur ToT, Google Cloud IoT, and IBM Watson lop, Select project requirements, The Develop the software application: Build the software ap your loT devices, as well asthe backend infrastructure. This involves programming the device firmware and implementing the necessary communication protocols, dag processing logic, and user interfaces. Implement connecti snable the devices to connect to the internet and establish, sn with the loT platform. This may involve configuring network settings, ith cloud services, and ensuring secure dat integrating transmission: Integrate data and analytics: Collect and process the data generated by the lo devices. Use appropriate techniques suchas data storage, real-time analytics, machine learning, or predi ts from the data. This step oft cs ng with cloud services or data analytics platforms. Implement seeurity measures: loT security is crucial ect the devices, data, threats. Implement ion, access controls, and regular software updates to ensure a secure IoT ecosystem. and infrastructure from unauthorized access and poter Design and develop user i teract with the loT system. This can include web or mobi that provide real-time monitoring, control, and visualization of the IoT device their data, Test different scenarios, edge cases, ion against the defined use case and requirements. Deployment and maintenance: Deploy the *T solution into the target environment Monitor and maint the system to ensure its smooth operation, perform updates and bug fixes as needed, and address any operational issues or scalability challenge ship stakebolders, nel m segdanain experts. Effective communication, jon are key to successful [oT app] vare developers, data scientists, Proper project management, and ongoing ion development, J HOME AUTOMATION USING IoT a ‘ome automation has three major parts; + Hardware Sofware/apps ding a ‘truly smart home experience for your customers. having the right hardware enables the ability to develop your loT prototype technology pivots with ease. ively and respond to 53.1 Applications of home automation ‘The areas where consumers can expect to see home automation led loT-enabled connectivity are: + Lighting Control + HVAC + Lawn/Gardening Management + Smart Home Appliances + Improved Home Safety and Security + Home Air Quality and Water Quality M Natural Language-Based Voice Assistants itoring + Better Infotainment Delivery + Al-Driven Digital Experiences + Smart Switches + Smart Locks Smart Energy Meterspec el iE) saa Embedded Systems andlor q i 5.3.2 Home Automation Components ‘There are probably thousands of such sensors out there that can be a part of this list, but since this isan introduct Jhnology. we will break dovn IoT sensors for home auto 7 + Temperature Sensors + Lux Sensors +* Water Level Sensors + Air Composition Sensors + Video Cameras for Surveillance + Voice/Sound Sensors + Pressure Sensors Humidity Sensors + Accelerometers Infrared Sensors + Vibrations Sensors + Ultrasonic Sensors depending upon what you need, one or many of these to build a truly smart home oT product. The most commonly used home automation sensors. ‘Temperature sensors ‘The famous temperature sensors a DHT 11/22, DS18b20, LM35, and MSP430 series from TI. The MSP430 setiesis more accurate than the rest, butat the same time, itis one of the most expensive for prototyping or initial product testing purposes. MSP430 topsall temperature sensors, asthe precision and battery consumption is minimal with them. ‘The DHTH has very restricted temperature range and suffers from aceuracy issues. DHT22, on the other hand, is a little bit more accurate but é preference. doesn’t make it as the The DS18B20. on the other hand. is more accurate, as opposed to digital temperature sensors like the DHT22 and 11. Dallas temperature sensors are analog and can be extremely accurate down to 0.5 degrees. ications Development RS pF pts Fig 5.3 : Flow of Temperature Sensor ‘The temperatures that you directly sense from these sensors may notbe very accurate, andyou would occas ly see 1000 for greater values no matter what you are doing, ofthe most popul Recent tests found them to be working fairly w Air composition sensors There area couple of specifi sensors that are used by developersto measure spec components in + Comonitoring by MICS-5525 + —MQ-8 to measure hydrogen gas levels MICS-2714 to measure nitrogen oxide al + MQI35to sense hazardous 235 levels (NH3, NOX. Alcohol, Benzene, smo} Co, “Most of these are sensors havea heating rebefore they actually sta dsivering aeurate values air: me, which also means that they requite 2516 Embedded Systems and lor Soe ree Video cameras for surveillance and ai ‘A range of webcams and cameras specific to hardware development kits are usually in such scenarios. hardware with USB port offer to integrate camera modules to build functionality. But tilizing USB ports is not very efficient, especially in the ase of re transfer or any kind of video processing. ime video ‘Take the raspberry pi for example. connects using a flex connector direc! ‘opening itup for your pet. Some commonly used sensors for sound detection include the SEN-12462 and easier shield for rapid prototyping. ‘can detect even ultra-low levels of noise and fine tune between various noise levels to build even machine break-up patterns. Humidity sensors to smart ‘These sensors bring the capability of sensing humidity/th levels in the ion depend alot on multiple factors, including the homes, the accuracy and sensing pre I sensor design and placement. But certain sensors like the DHT22 and perform poorly when compared to high-quality sensors like While b layer of humi small spaces, ie humidity might be too high at one end as compared to the others. Jook at free and open spaces where the air components can move. jon around the sensor can be expected to be uniform and, subsequent When you thedis requite fewer corrective actions for the right calibration. freel ions Development 517 jaaHome Automation Protocols portant parts of bu ‘ne ofthe most 18 home automation product ist thi soutprotocols~ protocols that you device wil useto communicate to gateways, servers, degsensrs-2 fe years ag, the only way to do so wasby eitherusing bluetooth, Wi-Fi G98. but due to added expenses on cellular sim cards and low performance of ns didn't work, Fimostsuch sol Bluetooth survived and later evolved as bluetooth sniart or bluetooth low energy. Bluetooth low energy or Bluetooth smart: wireless protocol with mesh capabi security, data encryption algorithms, and much more. ideal for iot-based products for smart homes. + Zigbee: low cost, mesh networked, and low power radio frequency-based protocol for loT. different Zighee versions don't talk to each other. 1s powerline wing for signaling and contro. + X10:a legacy protoc + Insteon: communicates with devices both wirelessly and with wires. 1s in home automation with an emphasis on security, i: needs no explanation. cs installed in a home. reduces costs. thread: a royalty-free protocol for smart home automation, usesa lowpan ow-posver protocol helping developers build low-powered : which protocol is the best? clearly offer much more, its always important to needs and then move towards narrowing down There are some protocol: Start from your smart home development theso ‘The commonly preferred protocols thread, The protocol selection can NOW! are Bluetooth low energy, Z-wave, Zighee, and be narrowed down by the following factors:Embedded Systems and toy ee 5.3.8 Home Automation Architecture + Dat ty + NoSQL databases 5.3.6 Home Automation Gatoways For developing a home automation product, often a standalone product sending data toa server is not enough. due to battery and protocol ns, the data froma sensor of sensors present ina home has been routed through an loT gateway. To select the perfec y for your loT home automation, consider some of these factors: + MQTT, coap, and * Security and configuration + Modularity | ajcations Development owing options rcatea gateway from he ground up singe ing Raspberry ‘ou can ereate your 6 custom hardware, 's Eateway modules like invincible gateway . these gateways are ly easy (0 customize and connect with your cloud services and devices, }eY May oF may not offer the same level of support that you need to id certain features, to some other technology stack may become very difficu ey are extremely good for robust prototyping needs. these gat emphasized t 53.7 Home Automation Programming Languages ‘The following programming languages dominate the home automation space: Python, Embedded C, C, shi ly happened due tothe sheer optim oe ee SE SHART AGRICULTURE ure refers tothe ut ‘Things (IoT), sensors, location systems, robots, and at on farms. ture is to achieve greater food self-sufficiency ing for environmental risks of crop failures and + The main goal of smartaj and revenues by compen’ increasing overall yield quality. + Tailor-made loT devices and Al solutions are preferable inorder tomaximiz= By training machine learning models with bothnew and eld prediction becomes areality.SoS Blak... saclen', _émbedeed Systems enaloy 5.4.1 Whatis Smart Agriculture? the whims of nature: winds, frosts sof harvest poses an enormous economie t Farmers always have to d environmental influences are a major risk. los en more so for small-scale farms. To compensate for losses .ce, and outdated and of ant years. Envirorimental factorsarea Jency in food has hit a record low in rece! broader digital transformation i laborand ensuring manpower. ‘The overall objective of smart agri the risks of crop failures and increasing the overall and larger revenues by minimizi yield quality. 5.4.2 How to Utilize Al for Yield Prediction and Optimization? inthe agriculture industry is the deployment insformat IoT devices are sensor-equipped tools that are connected ence, such smart devices can be implemented while reducing crop failures. They do so by monitoring, ease yields and product analyzing, and forecasting data solutions, we recommend tailor-made oT devices and multi-sensory and powerful appliations Development ‘hese 1oT devices can be used in traciors and mel tocollect data in real ee! pias ime. Farmers gain F sitreFevels. They can analyze topography ands easing technologies through smart algorithms, Th dea paible information, suchas historic weather and crop a data, of aeriz ofthe data gathered, machine learning models are train ify an te ied to identify pattems ~ making 543 Aland Automation Are Transforming Agriculture From small rice and tea farmers to fr i agrie toldings Al (through the use of computer vision and deep leaming) allows the automation tanesting and crop sorting, or precision irigation tosave water. Furthermore, loT devices such as Edge Al cameras can be deployed in the field, while drones generate ac e analysis and machine leaing algorithms then count ct pestand plant diseases, and even forecast ‘Toensure a smooth and automated workflow from collecting and accum i Data, we strongly recommend deploying a data processing and a . tock tracking and geofencing (smart Iogisties and warehousing)w " Development fications applications Peveormet sy nt feat + Smart transportation systems aim to reduce traffic public transportation, and enhance overall mobility. This can ie management, real-time public transit information, smart Support for electric vehicles, Embedded Systems and lor 5, Smart Governance and ‘agement: Technology is utilized to improve "engagement. Online platforms and mobile dens to acess public services, participate in decision-making, ide feedback to local aut ties prioritize the development of sustainable ludes eco-friendly buildings, smart grid systems, and data to improve the quality measures, and green spaces. ize resource management. These advanced security systems, te goal of smart cities isto improve the quality of life for like smart healthcare systems, smart education, programs, and enhanced connectivity. evolving, and different cities needs and challenges. The ing that the concept of smart. ize different aspects based on 5.6 SMART HEALTH CARE ‘Smart healthcare, also known as eHealth or digital health, refers tothe integration of ‘energy resources. They incorpo! and enengy management soluti and lower carbon emi wearable devices, health monitoring, sence (Al) in healthcare, among others. Here are some key aspects of smart healthcare:Embedded Systems and IoT nal paper-based iealth information, ing, and drug discovery. Itcan also automate administrat Jenhance the accuracy of medical it tohealthcare services, enhanced efficiency and costffectveness and management, and more personalized and patient-centered care, TWO MARK QUESTIONS AND ANSWERS
You might also like
Module 3 Iot
PDF
No ratings yet
Module 3 Iot
44 pages
CH 4 Edge To Cloud Protocol
PDF
No ratings yet
CH 4 Edge To Cloud Protocol
84 pages
Module 2-Topic b-IoT Communication Protocols
PDF
No ratings yet
Module 2-Topic b-IoT Communication Protocols
43 pages
Unit 4 - 2
PDF
No ratings yet
Unit 4 - 2
20 pages
ES-IoT unit 4
PDF
No ratings yet
ES-IoT unit 4
32 pages
VTU Exam Question Paper With Solution of 17EC752 IoT and Wireless Sensor Networks Feb-2021-Richa Tengshe
PDF
No ratings yet
VTU Exam Question Paper With Solution of 17EC752 IoT and Wireless Sensor Networks Feb-2021-Richa Tengshe
47 pages
Iot Protocol
PDF
No ratings yet
Iot Protocol
44 pages
iotfinal
PDF
No ratings yet
iotfinal
22 pages
4) Physical Design of Iot
PDF
No ratings yet
4) Physical Design of Iot
29 pages
Unit 5
PDF
No ratings yet
Unit 5
26 pages
Embedded Systems and IOT Unit-4
PDF
No ratings yet
Embedded Systems and IOT Unit-4
60 pages
Session 5 IoT Protocols and Architecture
PDF
No ratings yet
Session 5 IoT Protocols and Architecture
71 pages
IOT-M1-02
PDF
No ratings yet
IOT-M1-02
12 pages
Iot
PDF
No ratings yet
Iot
29 pages
EIOT Unit-4
PDF
No ratings yet
EIOT Unit-4
51 pages
02 Physical Design IoT Protocols
PDF
No ratings yet
02 Physical Design IoT Protocols
5 pages
MODULE IV (IOT)
PDF
No ratings yet
MODULE IV (IOT)
69 pages
IOT 3
PDF
No ratings yet
IOT 3
13 pages
iot unit 3 - Google Docs
PDF
No ratings yet
iot unit 3 - Google Docs
24 pages
Iot Mid
PDF
No ratings yet
Iot Mid
19 pages
Unit 4.1 High-Speed Networks
PDF
No ratings yet
Unit 4.1 High-Speed Networks
26 pages
Iot
PDF
No ratings yet
Iot
10 pages
13 01 2023 - CSE3009 IOT BK WebSocket XMPP DDS
PDF
No ratings yet
13 01 2023 - CSE3009 IOT BK WebSocket XMPP DDS
14 pages
Lecture 8 - Internet of Things
PDF
No ratings yet
Lecture 8 - Internet of Things
67 pages
communicating with cloud applications
PDF
No ratings yet
communicating with cloud applications
4 pages
Computer Networks
PDF
No ratings yet
Computer Networks
27 pages
Unit IV-1
PDF
No ratings yet
Unit IV-1
82 pages
Unit 3 - Internet of Things - WWW - Rgpvnotes.in
PDF
No ratings yet
Unit 3 - Internet of Things - WWW - Rgpvnotes.in
9 pages
IoT Module3 Draft
PDF
No ratings yet
IoT Module3 Draft
20 pages
Unit IV Raspberry Pi
PDF
No ratings yet
Unit IV Raspberry Pi
36 pages
protocols
PDF
No ratings yet
protocols
39 pages
HTTP
PDF
No ratings yet
HTTP
8 pages
Networks
PDF
No ratings yet
Networks
8 pages
2
PDF
No ratings yet
2
8 pages
Web Connectivity Principles in IoT (1)
PDF
No ratings yet
Web Connectivity Principles in IoT (1)
8 pages
Copy of IoT_lec05
PDF
No ratings yet
Copy of IoT_lec05
17 pages
Module 4
PDF
No ratings yet
Module 4
24 pages
Unit III-IOT- LESSON
PDF
No ratings yet
Unit III-IOT- LESSON
12 pages
IOTPPT[1]
PDF
No ratings yet
IOTPPT[1]
24 pages
Comm APIs
PDF
No ratings yet
Comm APIs
24 pages
Design of Iot Full
PDF
No ratings yet
Design of Iot Full
18 pages
Iot Unit1
PDF
No ratings yet
Iot Unit1
112 pages
Internet_Of_Things_Class5
PDF
No ratings yet
Internet_Of_Things_Class5
14 pages
IoT Unit 3
PDF
No ratings yet
IoT Unit 3
2 pages
IOT Communication Models and Protocols
PDF
No ratings yet
IOT Communication Models and Protocols
72 pages
Eiot- Unit IV
PDF
No ratings yet
Eiot- Unit IV
18 pages
Iot Communication Protocols
PDF
No ratings yet
Iot Communication Protocols
27 pages
ES Unit 4 & 5 Notes
PDF
No ratings yet
ES Unit 4 & 5 Notes
46 pages
Unit 4 Iot
PDF
No ratings yet
Unit 4 Iot
52 pages
IOT Unit 4
PDF
100% (1)
IOT Unit 4
60 pages
IoT U-I
PDF
No ratings yet
IoT U-I
51 pages
IOT COMPLETE NOTE (Module 1 2 3)
PDF
No ratings yet
IOT COMPLETE NOTE (Module 1 2 3)
63 pages
Comparison Between MQTT and Websocket Protocols For Iot Applications Using Esp8266
PDF
No ratings yet
Comparison Between MQTT and Websocket Protocols For Iot Applications Using Esp8266
6 pages
Logical Design of Iot
PDF
No ratings yet
Logical Design of Iot
7 pages
1.definition and Characteristics of Iot
PDF
No ratings yet
1.definition and Characteristics of Iot
19 pages
Unit 1
PDF
No ratings yet
Unit 1
12 pages
Iot Unit 4
PDF
No ratings yet
Iot Unit 4
53 pages
Edge To Cloud Protocol
PDF
No ratings yet
Edge To Cloud Protocol
21 pages
Unit 3 - Internet of Things - WWW - Rgpvnotes.in
PDF
No ratings yet
Unit 3 - Internet of Things - WWW - Rgpvnotes.in
15 pages